Finals Deck Flashcards
Encryption
renders message unreadable to everyone except intended recipient
Decryption
Revealing original meaning of encrypted message
Symmetric Key Encryption
Same key is used to encrypt and decrypt message
Computationally Secure
takes too long for a hacker to crack code
Hash Function
maps input of any size into output of fixed size
Certificate Authority
verifies digital signature of a trusted org.
Tapping
Eavesdropping on telephone lines
Sniffing
Eavesdropping on computer network
Radiation
wires give off electric signal that can be intercepted
Web Scraping
when computer program searches the web for info
Malware
malicious software designed to cause damage or loss of control to a computer
Computer Virus
Subset of Malware
software that attaches to other programs in order to be executed
Worm
Subset of Malware
similar to virus but runs on its own
Trojan Horse
Subset of Malware
software that appears to be benign, but actually runs malicious software in the background
Phishing
Subset of Malware
email or text that tricks user into giving sensitive information
Denial of Service Attack
Subset of Malware
overwhelm website by overloading with traffic
Spam
Subset of Malware
Junk email